An issue was discovered in the image-manager in Xoops 2.5.10. When any image with a JavaScript payload as its name is hovered over in the list or in the Edit page, the payload executes.
References
Link | Resource |
---|---|
https://github.com/XOOPS/XoopsCore25/commits/master | Patch Third Party Advisory |
https://xoops.org/modules/publisher/ | Vendor Advisory |
https://blog.nirajkhatiwada.com.np/cve-2019-16684-stored-cross-site-scripting/ | Exploit Third Party Advisory |
Configurations
Information
Published : 2019-09-30 09:15
Updated : 2019-10-04 09:33
NVD link : CVE-2019-16684
Mitre link : CVE-2019-16684
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
xoops
- xoops